600 likes | 744 Views
This document outlines the challenges of password management, highlighting the competing goals between usability and security. It discusses traditional password advice, memory experiments, and various management schemes designed to balance these two considerations. The need for strong, memorable passwords and the effectiveness of rehearsal and cues in memory retention are explored, alongside analysis of different strategies evaluated for their usability and security. Real-world applications and recommendations for enhancing password security while minimizing user effort are included.
E N D
Naturally Rehearsing Passwords Jeremiah Blocki NSF TRUST October 2013 Anupam Datta Manuel Blum
Password Management … Competing Goals:
A Challenging Problem Use numbers and letters Use special symbols Don’t Reuse Passwords Don’t use words/names Not too short Don’t Write it Down Use mix of lower/upper case letters Change your passwords every 90 days Traditional Security Advice
Experiment #0 Memorize the following string L~;z&K5De
Outline Introduction and Experiments Example Password Management Schemes Quantifying Usability Quantifying Security Our Password Management Scheme
Password Management … Competing Goals:
Scheme 1: Reuse Strong Password • Pick four random words w1,w2,w3,w4
Scheme 2: Strong Random Independent Four Independent Random Words per Account
Questions • How can we evaluate password management strategies? • Quantify Usability • Quantify Security • Can we design password management schemes which balance security and usability considerations?
Outline • Introduction and Experiments • Example Password Management Schemes • Quantifying Usability • Human Memory • Rehearsal Requirement • Visitation Schedule • Quantifying Security • Our Password Management Scheme
Human Memory is Semantic Memorize: nbccbsabc Memorize: tkqizrlwp 3 Chunks vs. 9 Chunks! Usability Goal: Minimize Number of Chunks Source: The magical number seven, plus or minus two [Miller, 56]
Cues • Cue: context when a memory is stored • Surrounding Environment • Sounds • Visual Surroundings • Web Site • …. • As time passes we forget some of this context…
Human Memory is Lossy • Rehearse or Forget! • How much work? • Quantify Usability • Rehearsal Assumption pamazon ???? pgoogle
Quantifying Usability • Human Memory is Lossy • Rehearse or Forget! • How much work does this take? • Rehearsal Assumptions • Visitation Schedule • Natural Rehearsal for frequently visited accounts
Rehearsal Requirement Expanding Rehearsal Assumption: user maintains cue-association pair by rehearsing during each interval [si, si+1]. Day: 1 2 4 5 8 Visit Amazon: Natural Rehearsal Google Xt: extra rehearsals to maintain all passwords for t days.
Rehearsal Requirement Day: 1 2 4 5 8 Xt: extra rehearsals to maintain all passwords for t days.
Visitation Schedule Poisson Process with parameter 𝞴 Cueshared by Amazon and Google +𝞴 t1 t2 t2
Visitation Schedule Poisson Process with parameter Amazon Google Day: 2 4 5 8 Number of accounts visited with frequency
Usability Results E[X365]: Extra Rehearsals to maintain all passwords over the first year. Usable Unusable
Outline • Introduction and Experiments • Example Password Management Schemes • Quantifying Usability • Quantifying Security • Background • Failed Ideas • Our Approach: Security as a Game • Our Password Management Scheme
Security (what could go wrong?) Three Types of Attacks Danger
Online Attack 123456 password 123456 Guess Limit: k-strikes policy
Offline Dictionary Attack jblocki, 123456 SHA1(12345689d978034a3f6)=85e23cfe0021f584e3db87aa72630a9a2345c062 +
Plaintext Recovery Attack pwd PayPaul.com pwd
Snowball Effect pwd pwd PayPaul.com + Source: CERT Incident Note IN-98.03: Password Cracking Activity
Our Security Approach • Dangerous World Assumption • Not enough to defend against existing adversaries • Adversary can adapt after learning the user’s new password management strategy • Provide guarantees even when things go wrong • Offline attacks should fail with high probability • Limit damage of a successful phishing attack
Security as a Game p1 p2 p3 p4 p5 Sha1(p4) PayPaul.com p5 q$1,000,000 guesses +
The Adversary’s Game pwd Sha1(pwd) • Adversary can compromise at most r sites (phishing). • Adversary can execute offline attacks against at most h additional sites • Resource Constraints => at most q guesses • Adversary wins if he can compromise any new sites.
(q,,m,s,r,h)-Security For any adversary Adv s = # online guesses q = # offline guesses r = # h = # Phishing Attack Accounts m = # of accounts Offline Attack Accounts
Example: (q,,m,3,1,1)-Security h=1 PayPaul.com + q guesses r=1
Security Results (q$1,000,000,,m,3,r,h)-security Usable + Insecure Unusable + Secure
Outline Introduction and Experiments Example Password Management Schemes Quantifying Usability Quantifying Security Our Password Management Scheme
Our Approach Private Public Cue • Object: bike Action: kicking • Object: penguin
Login … Pwd • Kic+Pen + Tor + Lio+ ...
Login … Pwd Kic+Pen + ….
Sharing Cues • Usability Advantages • Fewer stories to remember! • More Natural Rehearsals! • Security? Day: 1 2 4 5 8
(n,l,)-Sharing Set Family Definition: A (n,l,)-Sharing Set Family of size m is a family of sets {S1,…,Sm} with the following properties n n
(n,l,)-Sharing Set Family m – number of passwords {S1,…,Sm}. n – total #PAO stories l – #PAO stories for each site – max intersection – PAO stories for account i. n n
Security Results (q$1,000,000,,m,3,r,h)-security
Sharing Cues Thm: There is a (43,4,1)-Sharing Set Family of size m=90, and a (9,4,3)-Sharing Set Family of size 126 • Proof? • Chinese Remainder Theorem! • Notice that 43 = 9+10+11+13 where 9, 10, 11, 13 are pair wise coprime. • Ai uses cues: {i mod 9, i mod 10, i mod 11, i mod 13}
Chinese Remainder Theorem By the Chinese Remainder Theorem there is a unique number x s.t 1) 2) 3) Hence, for accounts Aiand Ajcannot use the same red cue and blue cue.
Example(Account #80) Public Cue for Account 80
Usability Results E[X365]: Extra Rehearsals to maintain all passwords over the first year.
Security Results (q$1,000,000,,m,3,r,h)-security Usable + Insecure Unusable + Secure Usable + Secure Usable + Secure
Experiment #0 Can anybody remember the 10 character password? L~;z&K5De